|
||||||
![]() |
![]() |
|||||
![]() |
||||||
|
||
|
Home > Product key software |
Related keywords: product, product information, spat product, scalar product, product organizer, image frame product, product presentation, spy product, script product |
|
|
101. | Screensaver Factory 4 Pro 4.0 (blumentals.net) ![]() | ||
for sale using special features for shareware authors - registration keys (single and per-customer), functionality limitations (image count, trial period), customizable nag-screen, readme information file and license agreement. With Screensaver Factory you can start your very own screensaver business | |||
Updated: 2, 2006 | Rating: 0 | Author: Karlis Blumentals | Size: 3124 kb | Shareware Go to category: Desktop > Similar programs | |||
102. | VisNetic MailServer 8.3.5 (deerfield.com) ![]() | ||
SSL/TLS encryption. IM transmissions between VisNetic Mail Server's IM server and any Jabber-compatible IM server located outside your organization are also secured via SSL/TLS. VisNetic Mail Server is a high performance mail server with an extensive, highly configurable feature set. This secure mail server is also ideal for use as a gateway mail server, features built-in anti spam | |||
Updated: 2, 2006 | Rating: 124 | Author: Deerfield Com | Size: 25757 kb | Shareware Go to category: Servers > Mail Servers Similar programs | |||
103. | Send-Safe Proxy Scanner 1.7.6 (send-safe.com) ![]() | ||
net by scanning IP ranges and checking existing lists of proxies. Key features: - Safe scanning using proxies. No more problems with ISPs! - Ability to check found proxies for SMTP protocol support (i.e. compatibility with anonymous mailers like Send-Safe). - Ability to save current state and resume it at the next start. - Proxylists to check and proxylists used for anonymous | |||
Updated: 2, 2006 | Rating: 1208 | Author: SEND-SAFE SEND-SAFE | Size: 440 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
104. | Remote Task Manager 3.8.2 (ntutility.com) ![]() | ||
The Performance Monitor displays a dynamic overview of the computer's performance (CPU and memory usage). RTM even supports remote installs, enabling a Systems Administrator to set up a service on remote machines without ever having to physically go to them. RTM adds the ability to lock/shutdown/reboot and to create processes on remote computers. This program is for Systems | |||
Updated: 2, 2006 | Rating: 0 | Author: Ashot Oganesyan | Size: 2339 kb | Demo Go to category: Network & Internet > Remote Computing Similar programs | |||
105. | Network Assistant 4.1 (gracebyte.com) ![]() | ||
IP Multicast technology that allows traffic-friendly group messages. Key features: - Serverless technology. Network Assistant does not require an Internet connection or a dedicated server. - Channels-based chat. There are four types of chat channels: general, announcer, password protected and private (person-to-person). Channels help to support discussions on different subjects | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexey Yudin | Size: 1482 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
106. | Keyboard Collector 2.07b (softdd.com) ![]() | ||
log and view all keys typed, including emails, instant messages, passwords, and more. You simply choose to have it run all the time, or to start at a specific time of the day, and it runs undetected while capturing all keyboard and data entry. Even if the computer is restarted, Keyboard Collector will automatically start running again. It runs invisible, does not show when | |||
Updated: 2, 2006 | Rating: 113 | Author: SoftDD Software | Size: 715 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
107. | IPTunnelManager 1.3 (apbsoft.com) ![]() | ||
does not require opening additional ports and it does not transfer keys via the network (as it uses a synchronous algorithm to encrypt traffic). In fact, one and the same password is used to authorize a client and to encrypt data. The program IPTunnelManager is used for IP tunneling with the options for compressing and encrypting | |||
Updated: 2, 2006 | Rating: 0 | Author: Pavel Aronovich | Size: 1189 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
108. | Golden Keywords 4.10 (scosoft.com) ![]() | ||
from detecting potentially relevant keywords on web page to ranking key phrases relevance and importance. The application is capable of conducting its own keyword researches basing on initial key phrase found on web pages and monitoring top search engines and PPC services for number of search | |||
Updated: 2, 2006 | Rating: 0 | Author: Dan Smith | Size: 4237 kb | Shareware Go to category: Web Development > Site Administration Similar programs | |||
109. | 1st Mail Bomber 9.41 (softheap.com) ![]() | ||
1st Mail Bomber is a professional email software, mass mailer, bulk mailer intended for fast sending personalized emails and mailing list management. It allows you to organize email-based subscription on your web site and to send newsletters, information and notifications to a large number of recipients. You | |||
Updated: 2, 2006 | Rating: 336 | Author: Ixis Ltd | Size: 979 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
110. | 1st Mail Bomber Pro 9.41 (getfreefile.com) ![]() | ||
1st Mail Bomber is a professional mass mailer, bulk mailer, email software intended for fast sending personalized emails and mailing list management. It allows you to organize email-based subscription on your web site and to send newsletters, information and notifications to a large number of recipients. You | |||
Updated: 2, 2006 | Rating: 51 | Author: Ixis Ltd | Size: 979 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
|
Home > Product key software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|